Military Embedded Systems

Topic: cyberspace

Story
Managing the insider cyber risk in military organizations

August 05, 2024

User activity monitoring (UAM) serves as a vital technology in mitigating the insider risk threat posed by employees at military agencies. By tracking and analyzing their digital footprint, organizations can identify, contextualize, and remediate suspicious behavior that may indicate data exfiltration or malicious intent. UAM enables real-time monitoring of user actions, including file access, email communication, and application usage, and offers an understanding of those actions’ emotional context. These steps enable security teams to promptly detect any unauthorized activities during an employee’s transition period.